ALT-BU-2017-2984-1
Branch p8 update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-6298
An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "1 of 9. Null Pointer Deref / calloc return value not checked."
- DSA-3846
- DSA-3846
- http://www.openwall.com/lists/oss-security/2017/02/15/4
- http://www.openwall.com/lists/oss-security/2017/02/15/4
- 96423
- 96423
- https://github.com/Yeraze/ytnef/pull/27
- https://github.com/Yeraze/ytnef/pull/27
- FEDORA-2019-7d7083b8be
- FEDORA-2019-7d7083b8be
- https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/
- https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/
Modified: 2024-11-21
CVE-2017-6299
An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "2 of 9. Infinite Loop / DoS in the TNEFFillMapi function in lib/ytnef.c."
- DSA-3846
- DSA-3846
- http://www.openwall.com/lists/oss-security/2017/02/15/4
- http://www.openwall.com/lists/oss-security/2017/02/15/4
- 96423
- 96423
- https://github.com/Yeraze/ytnef/pull/27
- https://github.com/Yeraze/ytnef/pull/27
- FEDORA-2019-7d7083b8be
- FEDORA-2019-7d7083b8be
- https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/
- https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/
Modified: 2024-11-21
CVE-2017-6300
An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "3 of 9. Buffer Overflow in version field in lib/tnef-types.h."
- DSA-3846
- DSA-3846
- http://www.openwall.com/lists/oss-security/2017/02/15/4
- http://www.openwall.com/lists/oss-security/2017/02/15/4
- 96423
- 96423
- https://github.com/Yeraze/ytnef/pull/27
- https://github.com/Yeraze/ytnef/pull/27
- FEDORA-2019-7d7083b8be
- FEDORA-2019-7d7083b8be
- https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/
- https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/
Modified: 2024-11-21
CVE-2017-6301
An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "4 of 9. Out of Bounds Reads."
- DSA-3846
- DSA-3846
- http://www.openwall.com/lists/oss-security/2017/02/15/4
- http://www.openwall.com/lists/oss-security/2017/02/15/4
- 96423
- 96423
- https://github.com/Yeraze/ytnef/pull/27
- https://github.com/Yeraze/ytnef/pull/27
- FEDORA-2019-7d7083b8be
- FEDORA-2019-7d7083b8be
- https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/
- https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/
Modified: 2024-11-21
CVE-2017-6302
An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "5 of 9. Integer Overflow."
- DSA-3846
- DSA-3846
- http://www.openwall.com/lists/oss-security/2017/02/15/4
- http://www.openwall.com/lists/oss-security/2017/02/15/4
- 96423
- 96423
- https://github.com/Yeraze/ytnef/pull/27
- https://github.com/Yeraze/ytnef/pull/27
- FEDORA-2019-7d7083b8be
- FEDORA-2019-7d7083b8be
- https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/
- https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/
Modified: 2024-11-21
CVE-2017-6303
An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "6 of 9. Invalid Write and Integer Overflow."
- DSA-3846
- DSA-3846
- http://www.openwall.com/lists/oss-security/2017/02/15/4
- http://www.openwall.com/lists/oss-security/2017/02/15/4
- 96423
- 96423
- https://github.com/Yeraze/ytnef/pull/27
- https://github.com/Yeraze/ytnef/pull/27
- FEDORA-2019-7d7083b8be
- FEDORA-2019-7d7083b8be
- https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/
- https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/
Modified: 2024-11-21
CVE-2017-6304
An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "7 of 9. Out of Bounds read."
- DSA-3846
- DSA-3846
- http://www.openwall.com/lists/oss-security/2017/02/15/4
- http://www.openwall.com/lists/oss-security/2017/02/15/4
- 96423
- 96423
- https://github.com/Yeraze/ytnef/pull/27
- https://github.com/Yeraze/ytnef/pull/27
- FEDORA-2019-7d7083b8be
- FEDORA-2019-7d7083b8be
- https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/
- https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/
Modified: 2024-11-21
CVE-2017-6305
An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "8 of 9. Out of Bounds read and write."
- DSA-3846
- DSA-3846
- http://www.openwall.com/lists/oss-security/2017/02/15/4
- http://www.openwall.com/lists/oss-security/2017/02/15/4
- 96423
- 96423
- https://github.com/Yeraze/ytnef/pull/27
- https://github.com/Yeraze/ytnef/pull/27
- FEDORA-2019-7d7083b8be
- FEDORA-2019-7d7083b8be
- https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/
- https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/
Modified: 2024-11-21
CVE-2017-6306
An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "9 of 9. Directory Traversal using the filename; SanitizeFilename function in settings.c."
- DSA-3846
- DSA-3846
- http://www.openwall.com/lists/oss-security/2017/02/15/4
- http://www.openwall.com/lists/oss-security/2017/02/15/4
- 96423
- 96423
- https://github.com/Yeraze/ytnef/pull/27
- https://github.com/Yeraze/ytnef/pull/27
- FEDORA-2019-7d7083b8be
- FEDORA-2019-7d7083b8be
- https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/
- https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/
Modified: 2024-11-21
CVE-2017-6800
An issue was discovered in ytnef before 1.9.2. An invalid memory access (heap-based buffer over-read) can occur during handling of LONG data types, related to MAPIPrint() in libytnef.
- DSA-3846
- DSA-3846
- https://github.com/Yeraze/ytnef/commit/f98f5d4adc1c4bd4033638f6167c1bb95d642f89
- https://github.com/Yeraze/ytnef/commit/f98f5d4adc1c4bd4033638f6167c1bb95d642f89
- https://github.com/Yeraze/ytnef/issues/28
- https://github.com/Yeraze/ytnef/issues/28
- FEDORA-2019-7d7083b8be
- FEDORA-2019-7d7083b8be
Modified: 2024-11-21
CVE-2017-6801
An issue was discovered in ytnef before 1.9.2. There is a potential out-of-bounds access with fields of Size 0 in TNEFParse() in libytnef.
Modified: 2024-11-21
CVE-2017-6802
An issue was discovered in ytnef before 1.9.2. There is a potential heap-based buffer over-read on incoming Compressed RTF Streams, related to DecompressRTF() in libytnef.
- DSA-3846
- DSA-3846
- https://github.com/Yeraze/ytnef/commit/22f8346c8d4f0020a40d9f258fdb3bfc097359cc
- https://github.com/Yeraze/ytnef/commit/22f8346c8d4f0020a40d9f258fdb3bfc097359cc
- https://github.com/Yeraze/ytnef/issues/34
- https://github.com/Yeraze/ytnef/issues/34
- FEDORA-2019-7d7083b8be
- FEDORA-2019-7d7083b8be
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-6014
In Wireshark 2.2.4 and earlier, a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory.
Modified: 2024-11-21
CVE-2017-6467
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a Netscaler file parser infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by changing the restrictions on file size.
- DSA-3811
- DSA-3811
- 96561
- 96561
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12083
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12083
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=284ad58d288722a8725401967bff0c4455488f0c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=284ad58d288722a8725401967bff0c4455488f0c
- https://www.wireshark.org/security/wnpa-sec-2017-11.html
- https://www.wireshark.org/security/wnpa-sec-2017-11.html
Modified: 2024-11-21
CVE-2017-6468
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a NetScaler file parser crash, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by validating the relationship between pages and records.
- DSA-3811
- DSA-3811
- 96569
- 96569
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13430
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13430
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9f3bc84b7e7e435c50b8b68f0fc526d0f5676cbf
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9f3bc84b7e7e435c50b8b68f0fc526d0f5676cbf
- https://www.wireshark.org/security/wnpa-sec-2017-08.html
- https://www.wireshark.org/security/wnpa-sec-2017-08.html
Modified: 2024-11-21
CVE-2017-6469
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is an LDSS dissector crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-ldss.c by ensuring that memory is allocated for a certain data structure.
- DSA-3811
- DSA-3811
- 96577
- 96577
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13346
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13346
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4f753c127082d5e28abf482d6d175cbfee6661f7
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4f753c127082d5e28abf482d6d175cbfee6661f7
- https://www.wireshark.org/security/wnpa-sec-2017-03.html
- https://www.wireshark.org/security/wnpa-sec-2017-03.html
Modified: 2024-11-21
CVE-2017-6470
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is an IAX2 infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-iax2.c by constraining packet lateness.
- DSA-3811
- DSA-3811
- 96563
- 96563
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13432
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13432
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=0b89174ef4c531a1917437fff586fe525ee7bf2d
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=0b89174ef4c531a1917437fff586fe525ee7bf2d
- https://www.wireshark.org/security/wnpa-sec-2017-10.html
- https://www.wireshark.org/security/wnpa-sec-2017-10.html
Modified: 2024-11-21
CVE-2017-6471
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a WSP infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wsp.c by validating the capability length.
- DSA-3811
- DSA-3811
- 96564
- 96564
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13348
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13348
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=62afef41277dfac37f515207ca73d33306e3302b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=62afef41277dfac37f515207ca73d33306e3302b
- https://www.wireshark.org/security/wnpa-sec-2017-05.html
- https://www.wireshark.org/security/wnpa-sec-2017-05.html
Modified: 2024-11-21
CVE-2017-6472
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is an RTMPT dissector infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-rtmpt.c by properly incrementing a certain sequence value.
- DSA-3811
- DSA-3811
- 96571
- 96571
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13347
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13347
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2b3a0909beff8963b390034c594e0b6be6a4e531
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2b3a0909beff8963b390034c594e0b6be6a4e531
- https://www.wireshark.org/security/wnpa-sec-2017-04.html
- https://www.wireshark.org/security/wnpa-sec-2017-04.html
Modified: 2024-11-21
CVE-2017-6473
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a K12 file parser crash, triggered by a malformed capture file. This was addressed in wiretap/k12.c by validating the relationships between lengths and offsets.
- DSA-3811
- DSA-3811
- 96565
- 96565
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13431
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13431
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7edc761a01cda8e1b37677f673985582330317d2
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7edc761a01cda8e1b37677f673985582330317d2
- https://www.wireshark.org/security/wnpa-sec-2017-09.html
- https://www.wireshark.org/security/wnpa-sec-2017-09.html
Modified: 2024-11-21
CVE-2017-6474
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a NetScaler file parser infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by validating record sizes.
- DSA-3811
- DSA-3811
- 96566
- 96566
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13429
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13429
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a998c9195f183d85f5b0bbeebba21a2d4d303d47
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a998c9195f183d85f5b0bbeebba21a2d4d303d47
- https://www.wireshark.org/security/wnpa-sec-2017-07.html
- https://www.wireshark.org/security/wnpa-sec-2017-07.html
Package autologin-sh-functions updated to version 0.2.4-alt1 for branch p8 in task 179380.
Closed bugs
Сделать автологин для lxde-lxdm